問題一覧
1
1 ) Define Operating System (OS) System Processes:, - In the context of the Operating System,, - a system process is an instance of a computer program, - that is currently being executed by the CPU., - It is a fundamental unit of work in a modern OS , - and includes the program code,, - its associated data, execution context (CPU registers),, - and a dedicated address space within memory.
2
2 ) What are the two processes that system processes are broadly classified as:, - OS/Kernel Processes., - User Processes.
3
3 ) In regards to system processes, define the classification of OS/Kernel Processes:, - These are executed on behalf of the OS kernel, - and manage essential system resources, - (e.g., memory management, scheduling, I/O handling)., - They typically run with the highest privileges.
4
4 ) In regards to system processes, define the classification of User Processes:, - These are executed on behalf of a user,, - running applications like web browsers , - or word processors., - They run at a lower privilege level.
5
5 ) What are the key security mechanisms enforced by Operating System (OS) system processes?, - Process Isolation., - Privilege Management., - Access Control.
6
6 ) In regards to key security mechanisms enforced by Operating System (OS) system processes,, define the Process Isolation mechanism?, - The OS kernel enforces process isolation, - —a core security concept. , - This mechanism ensures that one process , - (and its associated data) , - cannot interfere with another process, , - preventing a vulnerability in a user application, - from compromising an , - entire system process or the kernel.
7
7 ) In regards to key security mechanisms enforced by Operating System (OS) system processes, , define the Privilege Management mechanism?, - Every system process , - is executed with a specific set of privileges (or user identity)., - Processes that perform critical OS functions, - (like a service process) , - run with high or "system" privileges., - If a threat actor exploits a flaw in a low-privilege application,, - they will attempt privilege escalation , - to gain the authority of a system process,, - thereby taking full control of the host machine.
8
8 ) In regards to key security mechanisms enforced by Operating System (OS) system processes,, define the Privilege Management mechanism?, - The OS uses the process's identity , - (the user or service account running the process), - to enforce Access Control Lists (ACLs). , - For a process to read or write a sensitive configuration file , - or access a peripheral, , - the OS first checks if the process's identity has the required permissions. , - Monitoring a process that suddenly attempts, - to access resources outside its normal scope , - is a key indicator of a security incident.
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前EXAM # 5 |
EXAM # 5 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 5 |
EXAM # 5 |
90問 • 7ヶ月前問題一覧
1
1 ) Define Operating System (OS) System Processes:, - In the context of the Operating System,, - a system process is an instance of a computer program, - that is currently being executed by the CPU., - It is a fundamental unit of work in a modern OS , - and includes the program code,, - its associated data, execution context (CPU registers),, - and a dedicated address space within memory.
2
2 ) What are the two processes that system processes are broadly classified as:, - OS/Kernel Processes., - User Processes.
3
3 ) In regards to system processes, define the classification of OS/Kernel Processes:, - These are executed on behalf of the OS kernel, - and manage essential system resources, - (e.g., memory management, scheduling, I/O handling)., - They typically run with the highest privileges.
4
4 ) In regards to system processes, define the classification of User Processes:, - These are executed on behalf of a user,, - running applications like web browsers , - or word processors., - They run at a lower privilege level.
5
5 ) What are the key security mechanisms enforced by Operating System (OS) system processes?, - Process Isolation., - Privilege Management., - Access Control.
6
6 ) In regards to key security mechanisms enforced by Operating System (OS) system processes,, define the Process Isolation mechanism?, - The OS kernel enforces process isolation, - —a core security concept. , - This mechanism ensures that one process , - (and its associated data) , - cannot interfere with another process, , - preventing a vulnerability in a user application, - from compromising an , - entire system process or the kernel.
7
7 ) In regards to key security mechanisms enforced by Operating System (OS) system processes, , define the Privilege Management mechanism?, - Every system process , - is executed with a specific set of privileges (or user identity)., - Processes that perform critical OS functions, - (like a service process) , - run with high or "system" privileges., - If a threat actor exploits a flaw in a low-privilege application,, - they will attempt privilege escalation , - to gain the authority of a system process,, - thereby taking full control of the host machine.
8
8 ) In regards to key security mechanisms enforced by Operating System (OS) system processes,, define the Privilege Management mechanism?, - The OS uses the process's identity , - (the user or service account running the process), - to enforce Access Control Lists (ACLs). , - For a process to read or write a sensitive configuration file , - or access a peripheral, , - the OS first checks if the process's identity has the required permissions. , - Monitoring a process that suddenly attempts, - to access resources outside its normal scope , - is a key indicator of a security incident.